漏洞标题
N/A
漏洞描述信息
"sBLOG 0.7.3 Beta 中的inc/lang.php文件中存在的目录遍历漏洞允许远程攻击者通过conf_lang_default参数中的..(dot dot)来包含和执行任意本地文件,具体来说,可以通过将PHP序列注入到Apache HTTP Server日志文件中,然后由inc/lang.php包含进来。"
将上述中文翻译成英文为:
"The inc/lang.php file in sBLOG 0.7.3 Beta has a directory traversal vulnerability that allows remote attackers to include and execute arbitrary local files via a.. (dot dot) in the conf_lang_default parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by inc/lang.php."
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞类别
N/A
漏洞标题
N/A
漏洞描述信息
Directory traversal vulnerability in inc/lang.php in sBLOG 0.7.3 Beta allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the conf_lang_default parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by inc/lang.php.
CVSS信息
N/A
漏洞类别
N/A
漏洞标题
sBLOG 'inc/lang.php'目录遍历漏洞
漏洞描述信息
sBLOG的inc/lang.php中存在目录遍历漏洞。远程攻击者可以借助conf_lang_default参数中的..,包含和运行任意的本地文件。
CVSS信息
N/A
漏洞类别
路径遍历